The Latest in IT Security

Posts Tagged ‘spike’

As mentioned in our previous post, Microsoft’s study [PDF] behind Operation b70 found that PC consumers might be at risk of malware infection even with brand new computers, if the computers come pre-installed with counterfeit versions of Windows software. This is what happened to some consumers in China who purchased their computers from an untrusted supply chain. […]

Read more ...

Before Java can release a patch for the recent zero-day exploit blogged by Sean earlier, Blackhole waltzes into the scene with an update. So the exploit kit users can now avail of the latest BH with the new zero-day exploit (CVE-2012-4681). I wonder if this will actually put a spike on Blackhole sales. The authors […]

Read more ...

05
Jul
2012

We had included Win32/Kuluoz and Win32/Cleaman in the June edition of the Microsoft Malicious Software Removal Tool (MSRT). In this blog post we will discuss Win32/Cleaman – a family that belongs to the category of “web redirector”. Win32/Cleaman is a multi-component trojan with the capability to redirect web search queries. It is usually distributed via […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments